100% tevredenheidsgarantie Direct beschikbaar na betaling Zowel online als in PDF Je zit nergens aan vast
logo-home
CS 345 Quiz 2 | Questions with 100% Correct Answers €12,69   In winkelwagen

Tentamen (uitwerkingen)

CS 345 Quiz 2 | Questions with 100% Correct Answers

 9 keer bekeken  0 keer verkocht
  • Vak
  • CS 345
  • Instelling
  • CS 345

CS 345 Quiz 2 | Questions with 100% Correct Answers In 2008, the _______ granted expanded authority to collect, without court-approved warrants, international communications as they flow through the network equipment and facilities. Foreign Intelligence Surveillance Act Amendments Act A(n) _____...

[Meer zien]

Voorbeeld 2 van de 6  pagina's

  • 9 oktober 2024
  • 6
  • 2024/2025
  • Tentamen (uitwerkingen)
  • Vragen en antwoorden
  • CS 345
  • CS 345
avatar-seller
CS 345 Quiz 2



In 2008, the _______ granted expanded authority to collect, without court-approved
warrants, international communications as they flow through the network equipment and
facilities.
Foreign Intelligence Surveillance Act Amendments Act

A(n) _____ is a device that records the originating number of incoming calls for a
particular phone number
Trap and Trace

_______ have become a common and easily created form of malware that are creating
using applications such as Visual Basic or VBScript.
Macro Viruses

The Organization for Economic Co-operation and Development's _______, established
in 1980, are often held up as the model of ethical treatment in consumer data.
Fair information practices

The _____ bars the export of data to countries that do not have data privacy protection
standards comparable to those of its member countries.
European Union Data Protection Directive

_____ are poorly trained and inadequately managed employees who mean well but
have the potential to cause much damage.
Negligent Insiders

A _____ attack keeps the target so busy responding to a stream of automated requests
that legitimate users cannot get in.
Distributed denial-of-service

In Doe v. Holder, the courts ruled that the NSL gag provision violates the _____.
First Amendment

The _____ prohibits the government from concealing the existence of any personal data
record-keeping systems.
Privacy Act

In computing, a(n) _____ is a term for any sort of general attack on an information
system that takes advantage of a particular system vulnerability.
Exploit

, _____ is an annual gathering in Las Vegas of computer hackers.
DEFCON

In the context of the Fourth Amendment, the courts have ruled that _____.
Without a reasonable expectation of privacy, there is no privacy right

The _____ prohibits unauthorized access to stored wire and electronic communications,
such as the contents of email inboxes, instant messages, message boards, and social
networking sites.
Electronic Communications Privacy Act

The Children's Online Privacy Protection Act _____.
Does not cover the dissemination of information to children

The _____ is a federal law that provides a definition of the term cyberterrorism and
under which young people primarily involved in what they consider to be minor
computer pranks have been tried as cyberterrorists.
USA Patriot Act

Installation of a corporate _____ is the most common computer security precaution
taken by businesses.
Firewall

Spammers can defeat the registration process of free email services by launching a
coordinated _____ attack that can sign up for thousands of untraceable email accounts.
Bot

_____ test the limitations of information systems out of intellectual curiosity to see
whether they can gain access and how far they can go.
Hackers

The _____ protects against unreasonable search and seizure.
Fourth Amendment

The _____ regulates the collection of the content of wire and electronic
communications.
Wiretap Act

The _____ allows consumers to request and obtain a free credit report each year from
each of the three primary credit reporting companies.
Fair and Accurate Credit Transactions Act

A _____ is a form of Trojan horse which executes when it is triggered by a specific
event such as a change in a particular file, by typing a specific series of keystrokes, or
by a specific time or date.
logic bomb

Voordelen van het kopen van samenvattingen bij Stuvia op een rij:

Verzekerd van kwaliteit door reviews

Verzekerd van kwaliteit door reviews

Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!

Snel en makkelijk kopen

Snel en makkelijk kopen

Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.

Focus op de essentie

Focus op de essentie

Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!

Veelgestelde vragen

Wat krijg ik als ik dit document koop?

Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.

Tevredenheidsgarantie: hoe werkt dat?

Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.

Van wie koop ik deze samenvatting?

Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper Jumuja. Stuvia faciliteert de betaling aan de verkoper.

Zit ik meteen vast aan een abonnement?

Nee, je koopt alleen deze samenvatting voor €12,69. Je zit daarna nergens aan vast.

Is Stuvia te vertrouwen?

4,6 sterren op Google & Trustpilot (+1000 reviews)

Afgelopen 30 dagen zijn er 77254 samenvattingen verkocht

Opgericht in 2010, al 14 jaar dé plek om samenvattingen te kopen

Start met verkopen
€12,69
  • (0)
  Kopen